A workloads management method for on-demand applications in distributed network functions Virtualization Infrastructure (dNFVI) includes receiving usage data from a unikernel implementing one or more functions of a plurality of functions related to a Virtual network function (VNF); determining an update to the one or more functions in the unikernel based on the usage data; updating the unikernel by requesting generation of application code for the unikernel based on the update; and starting the updated unikernel and redirecting service requests thereto. The unikernel and the updated unikernel are executed directly on a hypervisor
|
13. A non-transitory computer-readable medium comprising instructions that, when executed, cause one or more processors to perform the steps of:
receiving usage data from a unikernel implementing one or more functions of a plurality of functions related to a Virtual network function (VNF);
determining an update to the one or more functions in the unikernel based on the usage data;
updating the unikernel by requesting generation of application code for the unikernel based on the update; and
starting the updated unikernel and redirecting service requests thereto,
wherein the unikernel and the updated unikernel are each a specialized, single address space machine image constructed using library operating systems which is executed directly on a hypervisor.
1. A workloads management method for on-demand applications in distributed network functions Virtualization Infrastructure (dNFVI), the workloads management method comprising:
receiving usage data from a unikernel implementing one or more functions of a plurality of functions related to a Virtual network function (VNF);
determining an update to the one or more functions in the unikernel based on the usage data;
updating the unikernel by requesting generation of application code for the unikernel based on the update; and
starting the updated unikernel and redirecting service requests thereto,
wherein the unikernel and the updated unikernel are each a specialized, single address space machine image constructed using library operating systems which is executed directly on a hypervisor.
7. A workloads manager for on-demand applications in distributed network functions Virtualization Infrastructure (dNFVI), the workloads manager comprising:
one or more processors; and
memory storing instructions that, when executed, cause the one or more processors to
receive usage data from a unikernel implementing one or more functions of a plurality of functions related to a Virtual network function (VNF),
determine an update to the one or more functions in the unikernel based on the usage data,
update the unikernel by requesting generation of application code for the unikernel based on the update, and
start the updated unikernel and redirect service requests thereto,
wherein the unikernel and the updated unikernel are each a specialized, single address space machine image constructed using library operating systems which is executed directly on a hypervisor.
2. The workloads management method of
receiving a service request for a function not included in the updated unikernel; and
implementing a second unikernel for the function not included in the updated unikernel.
3. The workloads management method of
stopping the unikernel subsequent to the starting of the updated unikernel.
4. The workloads management method of
5. The workloads management method of
6. The workloads management method of
8. The workloads manager of
receive a service request for a function not included in the updated unikernel, and
implement a second unikernel for the function not included in the updated unikernel.
9. The workloads manager of
stop the unikernel subsequent to the updated unikernel starting.
10. The workloads manager of
11. The workloads manager of
12. The workloads manager of
14. The non-transitory computer-readable medium of
receiving a service request for a function not included in the updated unikernel; and
implementing a second unikernel for the function not included in the updated unikernel.
15. The non-transitory computer-readable medium of
stopping the unikernel subsequent to the starting of the updated unikernel.
16. The non-transitory computer-readable medium of
17. The non-transitory computer-readable medium of
|
The present disclosure generally relates to networking systems and methods. More particularly, the present disclosure relates to systems and methods for distributed and on-demand applications and workflow management in Distributed Network Functions Virtualization (DNFV).
Network Functions Virtualization (NFV) is a network architecture concept that uses the technologies of virtualization to virtualize entire classes of network node functions into building blocks that may connect, or chain together, to create communication services. A Virtualized Network Function (VNF) may include one or more virtual machines running different software and processes, on top of standard high-volume servers, switches and storage devices, or even cloud computing infrastructure, instead of having custom hardware appliances for each network function. For example, a virtual session border controller could be deployed to protect a network without the typical cost and complexity of obtaining and installing physical network protection units. Other examples of NFV include virtualized load balancers, firewalls, intrusion detection devices and Wide Area Network (WAN) accelerators. Ideally, virtualized functions should be located where they are the most effective and least expensive. That means a service provider should be free to locate NFV in all possible locations, from the data center to the network node to the customer premises. This approach, known as distributed NFV, has been emphasized from the beginning as NFV was being developed and standardized. For some cases, there are clear advantages for a service provider to locate this virtualized functionality at the customer premises. These advantages range from economics to performance to the feasibility of the functions being virtualized.
In conventional approaches, VNFs are realized with Virtual Machines (VMs). VMs include operating-system virtualization, which boot a standard operating system kernel (such as Linux, Windows, etc.) and run unmodified applications. These VMs are managed by orchestration systems like OpenStack, VMWare, etc. Other approaches to VNF realization can include software containers. Software containers contain an entire runtime environment, namely an application, plus all its dependencies, libraries and other binaries, and configuration files needed to run it, bundled into one package. By containerizing the application platform and its dependencies, differences in operating systems distributions and underlying infrastructure are abstracted away. VMs, by contrast, include the same application along with an entire operating system. Thus, a physical server running three virtual machines would have a hypervisor and three separate operating systems running on top of it. On the contrary, software containers would use the same operating system on the physical server. Disadvantageously, in DNFV, VM and software containers are heavy since each contains a whole operating system. Existing cloud orchestration systems such as OpenStack have a high latency when manipulating small VMs. For example, OpenStack will not be able to manage the case of 2000-3000 VMs per host.
In contrast to VMs and software containers, unikernels are specialized, single address space machine images constructed by using library operating systems. For example, a developer selects, from a modular stack, the minimal set of libraries which correspond to the operating system constructs required for their application to run. These libraries are then compiled with the application and configuration code to build sealed, fixed-purpose images (unikernels) which run directly on a hypervisor or hardware without an intervening operating system such as Linux or Windows. That is, unikernels are applications written in a high-level language and compiled into the standalone kernel. These applications are managed simply by wrapping them as block devices and registering them to the cloud provider (for example Amazon Machine Image AMI for Amazon EC2).
Existing unikernel systems concentrate their efforts on the optimization and generation of the standalone kernel. The downside is that adjusting functionality by altering a compiled unikernel is generally not attempted due to the lack of a low latency distributed solution. There are no known distributed management systems whereby a workload/application can request to be regenerated and re-deployed as single purpose application. There is no known DevOps style participation by the unikernels at the edge of the distributed infrastructure. However, unikernels are much lighter compared to VMs and software containers and would be advantageous to use for VNF realization in distributed NFV implementations.
In an exemplary embodiment, a workloads management method for on-demand applications in distributed Network Functions Virtualization Infrastructure (dNFVI) includes receiving usage data from a unikernel implementing one or more functions of a plurality of functions related to a Virtual Network Function (VNF); determining an update to the one or more functions in the unikernel based on the usage data; updating the unikernel by requesting generation of application code for the unikernel based on the update; and starting the updated unikernel and redirecting service requests thereto. The workloads management method can further include receiving a service request for a function not included in the updated unikernel; and implementing a second unikernel for the function not included in the updated unikernel. The workloads management method can further include stopping the unikernel subsequent to the starting of the updated unikernel. The unikernel and the updated unikernel can be executed directly on a hypervisor. The usage data can include DevOps metadata, configurations, and usage metrics, and wherein the update can be determined based on the usage metrics of the one or more functions. The requesting generation of the application code can be to a unikernel generation agent which pulls the application code for one or more of the plurality of functions based on the update and performs compilations to generate the updated unikernel. The workloads management method can be performed by a workloads manager implemented on the unikernel, and wherein other unikernels are managed using an Application Programming Interface (API) to the workloads manager.
In another exemplary embodiment, a workloads manager for on-demand applications in distributed Network Functions Virtualization Infrastructure (dNFVI) includes one or more processors; and memory storing instructions that, when executed, cause the one or more processors to receive usage data from a unikernel implementing one or more functions of a plurality of functions related to a Virtual Network Function (VNF), determine an update to the one or more functions in the unikernel based on the usage data, update the unikernel by requesting generation of application code for the unikernel based on the update, and start the updated unikernel and redirect service requests thereto. The memory storing instructions that, when executed, can further cause the one or more processors to receive a service request for a function not included in the updated unikernel, and implement a second unikernel for the function not included in the updated unikernel. The memory storing instructions that, when executed, can further cause the one or more processors to stop the unikernel subsequent to the updated unikernel starting. The unikernel and the updated unikernel can be executed directly on a hypervisor. The usage data can include DevOps metadata, configurations, and usage metrics, and wherein the update can be determined based on the usage metrics of the one or more functions. The requesting generation of the application code can be to a unikernel generation agent which pulls the application code for one or more of the plurality of functions based on the update and performs compilations to generate the updated unikernel. Other unikernels can be managed using an Application Programming Interface (API) to the workloads manager.
In a further exemplary embodiment, a non-transitory computer-readable medium including instructions that, when executed, cause one or more processors to perform the steps of receiving usage data from a unikernel implementing one or more functions of a plurality of functions related to a Virtual Network Function (VNF); determining an update to the one or more functions in the unikernel based on the usage data; updating the unikernel by requesting generation of application code for the unikernel based on the update; and starting the updated unikernel and redirecting service requests thereto. The instructions that, when executed, can further cause the one or more processors to perform the steps of receiving a service request for a function not included in the updated unikernel; and implementing a second unikernel for the function not included in the updated unikernel. The instructions that, when executed, can further cause the one or more processors to stopping the unikernel subsequent to the starting of the updated unikernel. The unikernel and the updated unikernel can be executed directly on a hypervisor. The usage data can include DevOps metadata, configurations, and usage metrics, and wherein the update can be determined based on the usage metrics of the one or more functions. The requesting generation of the application code can be to a unikernel generation agent which pulls the application code for one or more of the plurality of functions based on the update and performs compilations to generate the updated unikernel.
The present disclosure is illustrated and described herein with reference to the various drawings, in which like reference numbers are used to denote like system components/method steps, as appropriate, and in which:
In various exemplary embodiments, the present disclosure relates to systems and methods for distributed and on-demand applications and workflow management in Distributed Network Functions Virtualization (DNFV). The systems and methods include using unikernels for VNF implementation. The systems and methods cover the on demand (just in time) management of applications/workloads at the edge (including the customer premises) of a distributed infrastructure. Specifically, the systems and methods push the application/workload management to the edge of the distributed infrastructure, run the application/workload to participate in the DevOps approach, generate utilization metrics that are tuned to a functionality based shutdown/restart cycle, split the application/workload into specialized applications/workloads based on the self-learned usage metrics at the very edge of the infrastructure, perform just in time launching of application/workload to serve requests, and the like. In an exemplary implementation, a Mirage Domain Name System (DNS) server was shown to outperform both BIND 9 (by about 45%) and a high-performance NSD server. A unikernel image was just 200 Kb while the BIND 9 application was over 400 Mb, a significant improvement.
Software-Defined Wide-Area Networking (SD-WAN) and virtual Customer Premise Equipment (vCPE) have emerged as the pre-eminent use cases for Software-Defined Networking (SDN). Service providers and enterprises are applying software-defined principles to the WAN and the network edge. In addition to SD-WAN and vCPE, the service providers desire to have virtual Contend Distribution Network (vCDN) at the edge to cope with the anticipated increase in Over-the-Top (OTT) style on-demand and live video traffic.
Referring to
The overall goal is to enable the network operator to offer services to their customers. In the case of dNFV, these services will include VNFs 12 running on the compute resources near the edge and/or at the customer premises 16, but the end-to-end service may include VNFs 12 in the data center as well as various other virtual and physical network functions. However, operators have no way of knowing in advance how workload features are going to be used (or not used) at each of the vCPE 16. Thus, conventionally, these operators use bloated VNFs that are wasting resources at the edge of the distributed infrastructure. The bloated VNFs will run in “virtualization containers” which can either be Virtual Machines (VMs) or Linux Containers. Examples of conventional VNFs are Brocade 5600 vRouter, Silver Peak SD-WAN & WAN Opt, Certes vCEP, Versa FlexVNF, Akamai vCDN, etc.
The network 10 includes Virtual Infrastructure Manager (VIM) 18 for NFV deployments. OpenStack is a common VIM and the only VIM within the Open Platform for NFV (OPNFV) framework, and that would make OpenStack an attractive deployment model. An orchestrator 20 manages the VIM 18, e.g., OpenStack, such as through Application Programming Interfaces (APIs).
Referring to
In both the networks 10, 30, utilizing a VM and/or Docker software container, means that a standard operating system kernel is booted to run the application/workload. A highly layered software stack supports each application/workload. As a result, there is no optimization and the time for the application/workload to be ready to serve its purpose is relatively long. Another important trend is the VM density per host. Work is proceeding to support thousands (e.g., 2000-3000) of VMs per host. Recent performance is around 600+ VMs. Centralized management of this magnitude of VMs per host is not viable in the networks 10, 30. Service providers are adopting an agile, DevOps-style approach to developing and implementing automation in its network. There is a need for the workload itself to participate in this agile DevOps approach.
To address the aforementioned limitations, the systems and methods use unikernels for realizing the VNFs 12. The unikernels provide improved security, small footprint, whole system optimization, and low boot time. Specifically, the systems and methods include, the applications/workloads self-learn the functionalities that are utilized/not utilized and request new unikernel compilations and just in time deployments. As described herein, a unikernel is a workload or application.
In an exemplary embodiment, the systems and methods allow the applications/workloads to become self-aware of their usage and dynamically specialized into a single purpose application/workload to be re-deployed in distributed cloud platforms. These specialized single purpose application/workloads run directly on the hypervisor or hardware as a unikernel without the operating system such as Linux/Window.
Referring to
An exemplary operation is now described with the workloads manager 50. The workload 60 regularly informs the workloads manager 50 of its usage statistics (step 70-1). The workloads manager 50 determines that based on the usage statistics, the functionality B is sparsely (/rarely/infrequently) utilized. The workload 60 can be split into two different unikernels 72, 74. The first unikernel 72 is specialized with functionality A and C. The second unikernel 74 is specialized with the functionality B. The workloads manager 50 uses the workload DevOps metadata plus current configuration information to contact a unikernel generation agent (step 70-2) to build such unikernels, and download them to the host (the hypervisor 62 and the hardware 64).
The workloads manager 50 starts (step 70-3) the newly downloaded unikernel (with functionalities A and C) and starts redirecting service requests to this unikernel. The original workload 60 is then shut down (step 70-4). When an infrequent request for the functionality B is received at the workloads manager 50, the unikernel (with functionality B) is started to handle this request. After the request is handled, the workloads manager 50 shuts down the unikernel B (step 70-5). Thus, in operation, the unikernels for the workload 60 operate directly on the hypervisor 62 and the hardware 64. This is possible because of the low boot time nature of the unikernel.
The workloads manager 50 tracks various usage statistics (step 70-1). For example, the usage statistics are shown in a table 80 and can include, for each functionality A, B, C, execution time, average time, standard deviation, lower bound, upper bound, inactivity timestamps, etc. Also, the workloads manager 50 can use workload DevOps metadata plus current configuration information to contact the unikernel generation agent. The workload DevOps metadata plus current configuration information is shown, for example, in a table 82, and can include Git repository, GTI commit tag, continuous integration server, and current configuration.
Referring to
An example flow in the unikernel generation and management system 100 is described as follows. The unikernel 120 informs the workloads manager 50 with its DevOps metadata, its configurations, and self-instrumented usage metrics (step 130-1). The workloads manager 50 requests the unikernel generation agent 106 to specialize/re-generate this unikernel 120 into one or more unikernel images based on the functionality usage statistics (step 130-2). The unikernel generation agent 106 pulls the relevant modules 102 from the distributed version control system 104 and performs multiple compilations to generate the desired specialized images (step 130-3).
The resulting unikernel images are downloaded into the unikernel repositories 108 (step 130-4). The workloads manager 50 terminates the running unikernel, saving resource utilization (step 130-5). When a request for the unikernel is received, the workloads manager 50 pulls the corresponding image and can spin up the unikernel (because of low boot time) just in time to service the request (step 130-6).
Referring to
Referring to
The unikernel generation agent 106 can perform the following steps using the information from the metadata 152.
git clone git://github.com/blueplanet/sd-wan.git
git checkout 02312b5c72261f61a93b4dba4a9acdc09814fbd7
bin/featureExtract “A,C”--config‘{“ip”:“10.92.19.72”,“port”:8080}’
mirage configure-t xen && make
The following describes a specific example using an exemplary VNF, namely a Resource Adapter (RA) and how a workload can participate in the DevOps approach. This specific example is implemented using Python, but other programming languages are contemplated such as, without limitation, Go, Ocaml, Haskell, C/C++, Erlang, JavaScript (Node.js). The RA can be a VNF to manage a network element using Transaction Language 1 (TL1) over a secure shell to communicate with the network element. The RA has the functionalities to discover, provision, and performance management. As an example, the RA can manage Ciena's 6500 network element which is a Packet-Optical Transport System (POTS).
The unikernel generation agent 106 receives the request in
git clone ssh://git@bitbucket.ciena.com/bp_ra/bp-ra-ciena6500.git
cd bp-ra-ciena6500
git checkout 1.3.17
bin/featureExtract discovery
make clean
make prepare-venv
make requirements
make TAG=1.3.17_discovery FORMAT=docker image
The following generates a provision_perfmgmt only unikernel:
git clone ssh://git@bitbucket.ciena.com/bp_ra/bp-ra-ciena6500.git
cd bp-ra-ciena6500
git checkout 1.3.17
bin/featureExtract provision perfmgmt
make clean
make prepare-venv
make requirements
make TAG=1.3.17_provision_perfmgmt FORMAT=docker image
The following describes how a workload monitors its usage. The RA has built-in instrumentation to record the execution time for each of its functionality. At regular intervals (in this example, every 15 minutes), the RA sends the timing results to the workloads manager 50.
The following describes on demand (just in time) launching of a workload. The workloads manager 50 has load balancing functionalities like haproxy and Network Address Translation (NAT). In this specific example where the RA has three functionalities, discovery, provision, and perfmgmt (performance management), the workloads manager 50 load balances service requests across three (3) Resource Adapters.
Once the newly specialized RA images (that is one RA image with discovery and the other with provision/perfmgmt) are downloaded locally, the workloads manager 50 can optimize the resource utilization on the host.
A novel aspect of the systems and methods is that depending on the feature usage pattern at each deployment, the workloads manager 50 can specialize the RA to meet the demand. For example, if the perfmgmt feature is not used, the workloads manager 50 can decide to specialize the RA into three different images. One with discovery, another with the provision and the third with perfmgmt. That is, the relevant functionalities can be fine-tuned, deployed on demand (just in time) with lightweight unikernels.
Referring to
The usage data can include DevOps metadata, configurations, and usage metrics, and wherein the update is determined based on the usage metrics of the one or more functions. The requesting generation of the application code can be to a unikernel generation agent which pulls the application code for one or more of the plurality of functions based on the update and performs compilations to generate the updated unikernel. The workloads management process 300 can be performed by a workloads manager implemented on the unikernel, and wherein other unikernels are managed using an Application Programming Interface (API) to the workloads manager.
Referring to
The processor 402 is a hardware device for executing software instructions. The processor 402 can be any custom made or commercially available processor, a central processing unit (CPU), an auxiliary processor among several processors associated with the server 400, a semiconductor-based microprocessor (in the form of a microchip or chip set), or generally any device for executing software instructions. When the server 400 is in operation, the processor 402 is configured to execute software stored within the memory 410, to communicate data to and from the memory 410, and to generally control operations of the server 400 pursuant to the software instructions. The I/O interfaces 404 can be used to receive user input from and/or for providing system output to one or more devices or components. User input can be provided via, for example, a keyboard, touchpad, and/or a mouse. System output can be provided via a display device and a printer (not shown). I/O interfaces 404 can include, for example, a serial port, a parallel port, a small computer system interface (SCSI), a serial ATA (SATA), a fiber channel, Infiniband, iSCSI, a PCI Express interface (PCI-x), an infrared (IR) interface, a radio frequency (RF) interface, and/or a universal serial bus (USB) interface.
The network interface 406 can be used to enable the server 400 to communicate on a network. The network interface 406 can include, for example, an Ethernet card or adapter (e.g., 10BaseT, Fast Ethernet, Gigabit Ethernet, 10GbE) or a wireless local area network (WLAN) card or adapter (e.g., 802.11a/b/g/n/ac). The network interface 406 can include address, control, and/or data connections to enable appropriate communications on the network. A data store 408 can be used to store data. The data store 408 can include any of volatile memory elements (e.g., random access memory (RAM, such as DRAM, SRAM, SDRAM, and the like)), nonvolatile memory elements (e.g., ROM, hard drive, tape, CDROM, and the like), and combinations thereof. Moreover, the data store 408 can incorporate electronic, magnetic, optical, and/or other types of storage media. In one example, the data store 408 can be located internal to the server 400 such as, for example, an internal hard drive connected to the local interface 412 in the server 400. Additionally, in another embodiment, the data store 408 can be located external to the server 400 such as, for example, an external hard drive connected to the I/O interfaces 404 (e.g., SCSI or USB connection). In a further embodiment, the data store 408 can be connected to the server 400 through a network, such as, for example, a network attached file server.
The memory 410 can include any of volatile memory elements (e.g., random access memory (RAM, such as DRAM, SRAM, SDRAM, etc.)), nonvolatile memory elements (e.g., ROM, hard drive, tape, CDROM, etc.), and combinations thereof. Moreover, the memory 410 can incorporate electronic, magnetic, optical, and/or other types of storage media. Note that the memory 410 can have a distributed architecture, where various components are situated remotely from one another, but can be accessed by the processor 402. The software in memory 410 can include one or more software programs, each of which includes an ordered listing of executable instructions for implementing logical functions. The software in the memory 410 includes a suitable operating system (O/S) 414 and one or more programs 416. The operating system 414 essentially controls the execution of other computer programs, such as the one or more programs 416, and provides scheduling, input-output control, file and data management, memory management, and communication control and related services. The one or more programs 416 may be configured to implement the various processes, algorithms, methods, techniques, etc. described herein.
In an exemplary embodiment, a workloads manager for on-demand applications in distributed Network Functions Virtualization Infrastructure (dNFVI) includes one or more processors; and memory storing instructions that, when executed, cause the one or more processors to receive usage data from a unikernel implementing one or more functions of a plurality of functions related to a Virtual Network Function (VNF), determine an update to the one or more functions in the unikernel based on the usage data, update the unikernel by requesting generation of application code for the unikernel based on the update, and start the updated unikernel and redirect service requests thereto. The memory storing instructions that, when executed, can further cause the one or more processors to receive a service request for a function not included in the updated unikernel, and implement a second unikernel for the function not included in the updated unikernel. The memory storing instructions that, when executed, can further cause the one or more processors to stop the unikernel subsequent to the updated unikernel starting. The unikernel and the updated unikernel are executed directly on a hypervisor.
The usage data can include DevOps metadata, configurations, and usage metrics, and wherein the update is determined based on the usage metrics of the one or more functions. The requesting generation of the application code can be to a unikernel generation agent which pulls the application code for one or more of the plurality of functions based on the update and performs compilations to generate the updated unikernel. Other unikernels can be managed using an Application Programming Interface (API) to the workloads manager.
In a further exemplary embodiment, a non-transitory computer-readable medium includes instructions that, when executed, cause one or more processors to perform the steps of: receiving usage data from a unikernel implementing one or more functions of a plurality of functions related to a Virtual Network Function (VNF); determining an update to the one or more functions in the unikernel based on the usage data; updating the unikernel by requesting generation of application code for the unikernel based on the update; and starting the updated unikernel and redirecting service requests thereto.
It will be appreciated that some exemplary embodiments described herein may include one or more generic or specialized processors (“one or more processors”) such as microprocessors; Central Processing Units (CPUs); Digital Signal Processors (DSPs): customized processors such as Network Processors (NPs) or Network Processing Units (NPUs), Graphics Processing Units (GPUs), or the like; Field Programmable Gate Arrays (FPGAs); and the like along with unique stored program instructions (including both software and firmware) for control thereof to implement, in conjunction with certain non-processor circuits, some, most, or all of the functions of the methods and/or systems described herein. Alternatively, some or all functions may be implemented by a state machine that has no stored program instructions, or in one or more Application Specific Integrated Circuits (ASICs), in which each function or some combinations of certain of the functions are implemented as custom logic or circuitry. Of course, a combination of the aforementioned approaches may be used. For some of the exemplary embodiments described herein, a corresponding device in hardware and optionally with software, firmware, and a combination thereof can be referred to as “circuitry configured or adapted to,” “logic configured or adapted to,” etc. perform a set of operations, steps, methods, processes, algorithms, functions, techniques, etc. on digital and/or analog signals as described herein for the various exemplary embodiments.
Moreover, some exemplary embodiments may include a non-transitory computer-readable storage medium having computer readable code stored thereon for programming a computer, server, appliance, device, processor, circuit, etc. each of which may include a processor to perform functions as described and claimed herein. Examples of such computer-readable storage mediums include, but are not limited to, a hard disk, an optical storage device, a magnetic storage device, a ROM (Read Only Memory), a PROM (Programmable Read Only Memory), an EPROM (Erasable Programmable Read Only Memory), an EEPROM (Electrically Erasable Programmable Read Only Memory), Flash memory, and the like. When stored in the non-transitory computer readable medium, software can include instructions executable by a processor or device (e.g., any type of programmable circuitry or logic) that, in response to such execution, cause a processor or the device to perform a set of operations, steps, methods, processes, algorithms, functions, techniques, etc. as described herein for the various exemplary embodiments.
Although the present disclosure has been illustrated and described herein with reference to preferred embodiments and specific examples thereof, it will be readily apparent to those of ordinary skill in the art that other embodiments and examples may perform similar functions and/or achieve like results. All such equivalent embodiments and examples are within the spirit and scope of the present disclosure, are contemplated thereby, and are intended to be covered by the following claims.
Patent | Priority | Assignee | Title |
10944621, | May 09 2016 | Telefonaktiebolaget LM Ericsson (publ) | Orchestrator for a virtual network platform as a service (VNPAAS) |
11150937, | Jun 19 2017 | Siemens Aktiengesellschaft | Edge device and method for operating an edge device |
11704103, | Jan 28 2022 | MICROSTRATEGY INCORPORATED | Enhanced cloud-computing environment deployment |
11733989, | Mar 22 2021 | NEC Corporation | Automated and dynamic system call sealing |
11861342, | Jan 28 2022 | MICROSTRATEGY INCORPORATED | Enhanced cloud-computing environment deployment |
Patent | Priority | Assignee | Title |
8811968, | Nov 21 2007 | Fidelity Information Services, LLC | Systems and methods for executing an application on a mobile device |
9692712, | Dec 23 2014 | ACCEDIAN NETWORKS INC | Service OAM virtualization |
9912558, | Jan 13 2015 | Intel Corporation | Techniques for monitoring virtualized network functions or network functions virtualization infrastructure |
20090131035, | |||
20140177450, | |||
20140229945, | |||
20140317293, | |||
20150082308, | |||
20150127805, | |||
20150271043, | |||
20150326448, | |||
20160043944, | |||
20160050159, | |||
20160057234, | |||
20160139939, | |||
20160196449, | |||
20160205004, | |||
20160300227, | |||
20160364226, | |||
20160378989, | |||
20160381150, | |||
20170155724, | |||
20170170990, | |||
20170237647, | |||
20170237819, | |||
20170272523, | |||
20170364377, | |||
20180026858, | |||
20180026911, | |||
20180034801, | |||
20180046446, | |||
20180048523, | |||
20180069793, | |||
20180084084, | |||
20180091449, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Dec 12 2016 | HTAY, AUNG | Ciena Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 040719 | /0054 | |
Dec 13 2016 | Ciena Corporation | (assignment on the face of the patent) | / |
Date | Maintenance Fee Events |
Jun 23 2022 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Date | Maintenance Schedule |
Jan 01 2022 | 4 years fee payment window open |
Jul 01 2022 | 6 months grace period start (w surcharge) |
Jan 01 2023 | patent expiry (for year 4) |
Jan 01 2025 | 2 years to revive unintentionally abandoned end. (for year 4) |
Jan 01 2026 | 8 years fee payment window open |
Jul 01 2026 | 6 months grace period start (w surcharge) |
Jan 01 2027 | patent expiry (for year 8) |
Jan 01 2029 | 2 years to revive unintentionally abandoned end. (for year 8) |
Jan 01 2030 | 12 years fee payment window open |
Jul 01 2030 | 6 months grace period start (w surcharge) |
Jan 01 2031 | patent expiry (for year 12) |
Jan 01 2033 | 2 years to revive unintentionally abandoned end. (for year 12) |